General
-
Target
473ebb9c9b214d6ecf715322658569d6ae7bf050c01a58f42c3da61b4eafe642.elf
-
Size
300KB
-
Sample
241018-b112csyena
-
MD5
5d4282a728d4f03f67f43c6b11de3920
-
SHA1
a7c66c4a2bc20aff3ad2c8d4eb529a8d000bff35
-
SHA256
473ebb9c9b214d6ecf715322658569d6ae7bf050c01a58f42c3da61b4eafe642
-
SHA512
528e0d4df1366d501e27bfc2d0ec9b0aa51fc513eae86051ea2c8210a102d8e14945e954b671503c6a096137fa2e5fe57fe9704d043f03e514042f4c2bcc5ccd
-
SSDEEP
3072:2glZ3FtCKXhkmHtZ9TEKzjfj/WMngyIfsJ0F7xPto:2IIKXhZtL7jOTyIG87X
Behavioral task
behavioral1
Sample
473ebb9c9b214d6ecf715322658569d6ae7bf050c01a58f42c3da61b4eafe642.elf
Resource
debian9-mipsbe-20240611-en
Malware Config
Targets
-
-
Target
473ebb9c9b214d6ecf715322658569d6ae7bf050c01a58f42c3da61b4eafe642.elf
-
Size
300KB
-
MD5
5d4282a728d4f03f67f43c6b11de3920
-
SHA1
a7c66c4a2bc20aff3ad2c8d4eb529a8d000bff35
-
SHA256
473ebb9c9b214d6ecf715322658569d6ae7bf050c01a58f42c3da61b4eafe642
-
SHA512
528e0d4df1366d501e27bfc2d0ec9b0aa51fc513eae86051ea2c8210a102d8e14945e954b671503c6a096137fa2e5fe57fe9704d043f03e514042f4c2bcc5ccd
-
SSDEEP
3072:2glZ3FtCKXhkmHtZ9TEKzjfj/WMngyIfsJ0F7xPto:2IIKXhZtL7jOTyIG87X
Score9/10-
Contacts a large (4817) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Patched UPX-packed file
Sample is packed with UPX but required header fields are zeroed out to prevent unpacking with the default UPX tool.
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Enumerates running processes
Discovers information about currently running processes on the system
-
Writes file to system bin folder
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Boot or Logon Initialization Scripts
1RC Scripts
1Privilege Escalation
Boot or Logon Autostart Execution
1Boot or Logon Initialization Scripts
1RC Scripts
1